The term “Biometrics” is derived from “bio'” which means life, and “metrics”, which means measurement. Biometrics is developing for use in various technologies, including the unique identification and recognition of people. The technology at its current juncture is widely used in security and surveillance systems.
Biometrics also has the possibility of converging with other technologies and scientific studies. For example, behavioral biometrics can help improve newly evolving computer-human interfaces like voice control, gesture, and brainwave control for computer devices. Similarly, morphological and biological biometrics can be beneficial in the study of human evolution. Biological biometrics like DNA recognition combined with different medical and biomedical datasets can aid in the study of genetic diseases and even identify specific racial characteristics.
Behavioral biometrics aid in studying physical (bodily-kinesthetic) intelligence to improve and advance sports and military training. Biometric datasets can be especially in right-brain-education-system training in all eight types of human intelligence. Those comprise the following: verbal-linguistic, logical-mathematical, spatial, musical, bodily-kinesthetic, interpersonal, intrapersonal, and naturalistic. The biometric datasets can be helpful in the early identification of natural talents and improvements in training in specific human intelligence areas.
While security and surveillance applications are confined to biometric identification and recognition, biometric data can have many applications when combined with big data (different public and private datasets), artificial intelligence, machine learning, the internet of things, and computer-human interfaces.
The very first step in biometrics is the collection of biometric data. For this, there are different types of biometric sensors. These sensors are usually designed as edge devices, and more sophisticated sensors are cloud-controlled, involving a high level of encryption. Let us learn about biometric systems, various biometric sensors, and their types.
Biometrics is broadly divided into three categories as follows.
Biological biometrics: This involves biological measurements at the genetic or molecular level, and DNA sequencing is a biological biometric system. Biological biometrics require the sampling of DNA from blood or bodily fluids. This cannot be used for security or authentication systems but has other practical applications like DNA matching, genetic diseases, and microbiological studies.
Morphological biometrics: This involves the measurement of physical traits and body structures. The security and authentication systems are usually based on one or the other morphological biometrics. This includes fingerprint mapping, iris scan, face recognition, finger geometry recognition, vein recognition, hand geometry, ear recognition, and odor recognition.
Security systems use biometrics for authentication, while surveillance systems use biometrics for identification. The security systems usually have reference biometric data stored locally, i.e., in the edge device, or the device might not be connected to any internet network. The data may have stored templates for the identification of several persons. When a person requests access, a new sample of biometric data is collected by the scanner and compared with stored templates to determine if the person is authorized or not. The optical fingerprint scanners are the most widely used biometric security systems. These are low-cost and have applications ranging from standalone embedded devices to smartphones and computers. Multispectral fingerprint scanners are better than optical scanners but are costlier. More sophisticated biometric security systems may involve additional measurements like iris scanning, face recognition, finger geometry, hand geometry, or vein pattern recognition. Iris scanning along with hand geometry are the most preferred high-security systems.
The surveillance systems are intended for identification. Face recognition is the most viable surveillance system, and these systems usually do not have direct interaction or interface with persons to be identified. Biometric surveillance systems are always cloud-based, with biometric data cryptographically sent by edge devices over the network.
How do biometric security sensors work?
A biometric security system is designed for authentication. It involves three key stages – enrollment, storage, and comparison. In enrollment, the biometric data of valid users is entered into the device along with an identification key or number. For example, a fingerprint sensor may collect the fingerprint template of a valid user and assign it a unique identification number. This biometric data is stored in memory according to a software-defined template locally or on a centralized database. With the biometric identity of valid users stored in the device, whenever a user attempts to access the system, a new biometric sample is collected by the biometric scanner and compared with the stored templates. The matching with stored templates determines whether user identity is rejected or validated.
Many biometric security systems have a different approach. The biometric data is stored on a smart card instead of a local device or a centralized server. The security system is designed to validate the biometric data stored in the security token with the live sample collected from its user.
There are three types of biometric measurements – biological, morphological, and behavioral. Different biometric measurements are discussed below.
DNA recognition: This involves the collection of DNA samples in the form of blood or bodily fluids. The DNA is sequenced and stored in a similar format. A person’s DNA matches 99.7% with her biological parents, and the rest 0.3% is a variable repetitive code. The redundant code is unique to a person and is used for genetic fingerprinting.
Face recognition: This involves capturing a digital image of the face through pictures, video, or real-time streams. The digital image is compared against a face recognition pattern which is a mapping of various facial features.
Fingerprint mapping: Fingerprints are unique identifiers. Fingerprints are scanned using optical, ultrasonic, or capacitive scanners and stored in a predefined template. The new scans are compared with already stored fingerprint identifications to match an identity.
Hand geometry: This uses physical characteristics of the entire palm, including features of fingers, to identify a person.
Retina recognition: The blood vessels pattern of the retina are unique to a person. The Iris is scanned using visible or infrared light, and the retinal patterns are stored according to software-defined markers. The new scans are then compared with the stored retinal pattern for biometric authentication or identification.
Ear recognition: This uses the structure of the ear as an identifier. The shape and structure of ears remain intact for years and are again a unique body feature.
Odor recognition: This involves scent recognition using unique chemical patterns.
Signature recognition: This involves identification of handwriting in the signatures. This technology is widely used for authentication in banking and financial transactions.
Voice recognition: This uses the voice pattern of a person as a unique identifier.
Gesture recognition: This involves the identification of gesture patterns for personal identification.
Keystroke recognition: This involves measuring a person’s key-down and key-up patterns on a keyboard and using it for identification.
社交媒体接触识别:这个网络curity system tries to identify an online registered user based on her past interaction and engagement with a website.
Advantages and disadvantages of biometrics
At present, biometrics is widely used in forensics, law enforcement, airport security, healthcare, military and intelligence, civil identification, civil security, immigration control, access and authentication, banking, authentication of financial transactions, point-to-point sales, and anti-theft technologies. The biometric data has even greater scope when combined with other useful datasets.
Challenges in biometrics
Biometric scanners are integrated into embedded devices as well as in smartphones and many consumer devices. Many biometric identification systems such as face recognition, voice recognition, and gesture recognition can be easily implemented online without any specific infrastructure. The increasing presence of biometric scanners, surveillance cameras, and their connectivity to online networks has raised concerns about data security, privacy infringement, identity protection, and device safety.
Biometric sensors are gaining ground, particularly in security and surveillance systems. They are at least more reliable and efficient than traditional password or PIN-based security systems. Apart from security applications, biometric data has its scope when combined with demographic, geographical, medical, scientific, financial, and economic datasets.
You may also like: